Skip to main content

Cyber Crimes and Hackers

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 3192 Accesses

Abstract

The greatest threats to the security, privacy, and reliability of computer networks and other related information systems in general are cyber crimes committed by cyber criminals, but most importantly hackers. Judging by the damage caused by past cyber criminal and hacker attacks to computer networks in businesses, governments, and individuals, resulting in inconvenience and loss of productivity and credibility, one cannot fail to see that there is a growing community demand to software and hardware companies to create more secure products that can be used to identify threats and vulnerabilities, to fix problems, and to deliver security solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Cybercrime threat “real and growing”. http://news.bbc.co.uk/2/hi/science/nature/978163.stm

  2. Glossary of vulnerability testing terminology. http://www.ee.oulu.fi/research/ouspg/sage/glossary/

  3. Anatomy of an attack. The Economist, 19–25 February 2000

    Google Scholar 

  4. Kizza JM (2003) Social and ethical issues in the information age, 2nd edn. Springer, New York

    Google Scholar 

  5. Freeh LJ, FBI congressional report on cybercrime. http://www.fbi.gov/congress00/cyber021600.htm

  6. Slatalla M, A brief history of hacking. http://tlc.discovery.com/convergence/hackers/articles/history.html

  7. Phone phreaking: the telecommunications underground. http://telephonetribute.com/phonephreaking.html

  8. Timeline of hacking. http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html

  9. Rosenbaum R, Secrets of the little blue box. http://www.webcrunchers.com/crunch/esqart.html

  10. The complete history of hacking. http://www.wbglinks.net/pages/history/

  11. Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York

    Google Scholar 

  12. Denning D, Activism, hacktivism, and cyberterrorisim: the internet as a tool or influencing foreign policy. http://www.nautilus.og/info-policy/workshop/papers/denning.html

  13. Lemos R, Online vandals smoke New York Times site CNET News.com. http://news.com.com/2009–1001–252754.html

  14. Shachtman N, Hacktivists stage virtual sit-in at WEF Web site AlterNet. http://www.alternet.org/story.html?StoryID=12374

  15. Kizza JM (2001) Computer network security and cyber ethics. McFarland, North Calorina

    Google Scholar 

  16. Forchet K (1994) Computer security management. Boyd & Frasher Publishing, Danvers

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). Cyber Crimes and Hackers. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_5

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics